会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHODS AND APPARATUS FOR IDENTIFYING AND REMOVING MALICIOUS APPLICATIONS
    • 识别和去除恶性应用的方法和装置
    • WO2013170064A2
    • 2013-11-14
    • PCT/US2013/040394
    • 2013-05-09
    • SUNSTONE INFORMATION DEFENSE INC.
    • FORD, David K.
    • G06F21/568G06F21/566G06F2221/2105
    • A system, method, and apparatus for identifying and removing malicious applications are disclosed. An example apparatus includes an analysis server configured to receive from an executable application operating on a client device a data structure including information identifying processes operating on the client device during a time period and analyze the data structure to identify a malicious application by determining which of the processes on the client device were triggered after an application server was accessed by the executable application and identifying processes associated with the malicious application by comparing the determined processes to records of processes of a device similarly configured as the client device. The apparatus also includes a remover configured to determine files on the client device that are associated with the identified malicious application and transmit instructions to the executable application causing the executable application to remove the malicious application from operation on the client device.
    • 公开了用于识别和去除恶意应用的系统,方法和装置。 示例性装置包括:分析服务器,被配置为从在客户端设备上操作的可执行应用程序接收包括在一段时间内识别在客户端设备上运行的进程的信息的数据结构,并且通过确定哪个 在可执行应用程序访问应用程序服务器并通过将确定的进程与类似地配置为客户端设备的设备的进程的记录进行比较来识别与恶意应用程序相关联的过程之后触发客户端设备上的进程。 该装置还包括移除器,其被配置为确定与所识别的恶意应用程序相关联的客户端设备上的文件,并向可执行应用程序发送指令,导致可执行应用程序将恶意应用程序从客户端设备上移除。
    • 2. 发明申请
    • METHODS AND APPARATUS FOR IDENTIFYING AND REMOVING MALICIOUS APPLICATIONS
    • 识别和去除恶性应用的方法和装置
    • WO2013170064A3
    • 2014-05-08
    • PCT/US2013040394
    • 2013-05-09
    • SUNSTONE INFORMATION DEFENSE INC
    • FORD DAVID K
    • G06F12/16
    • G06F21/568G06F21/566G06F2221/2105
    • A system, method, and apparatus for identifying and removing malicious applications are disclosed. An example apparatus includes an analysis server configured to receive from an executable application operating on a client device a data structure including information identifying processes operating on the client device during a time period and analyze the data structure to identify a malicious application by determining which of the processes on the client device were triggered after an application server was accessed by the executable application and identifying processes associated with the malicious application by comparing the determined processes to records of processes of a device similarly configured as the client device. The apparatus also includes a remover configured to determine files on the client device that are associated with the identified malicious application and transmit instructions to the executable application causing the executable application to remove the malicious application from operation on the client device.
    • 公开了用于识别和去除恶意应用的系统,方法和装置。 示例性装置包括:分析服务器,被配置为从在客户端设备上操作的可执行应用程序接收包括在一段时间内识别在客户端设备上运行的进程的信息的数据结构,并且通过确定哪个 在可执行应用程序访问应用程序服务器并通过将确定的进程与类似地配置为客户端设备的设备的进程的记录进行比较来识别与恶意应用程序相关联的过程之后触发客户端设备上的进程。 该装置还包括移除器,其被配置为确定与所识别的恶意应用程序相关联的客户端设备上的文件,并向可执行应用程序发送指令,导致可执行应用程序将恶意应用程序从客户端设备上移除。
    • 4. 发明申请
    • OBSERVABLE AUTHENTICATION METHODS AND APPARATUS
    • 可观察的认证方法和设备
    • WO2014085816A1
    • 2014-06-05
    • PCT/US2013/072659
    • 2013-12-02
    • SUNSTONE INFORMATION DEFENSE INC
    • FORD, David, K.
    • H04L9/32H04L29/06
    • H04L63/08G06F21/36G06F2221/031H04W12/06H04W12/12H04W88/02
    • A system, method, and apparatus for providing observable authentication are disclosed. An example method includes receiving a request from a user to access an account, the request including an identifier associated with the user, determining a secret login rule previously provided to the user, and transmitting observable information to be displayed in a login map by a client device associated with the user. The example method also includes determining a correct answer by analyzing the positioning of the displayed observable information within the login map in conjunction with the secret login rule associated with the user. The example method further includes receiving an answer from the client device and providing the user access to the account responsive to the answer matching the correct answer.
    • 公开了一种用于提供可观察认证的系统,方法和装置。 示例性方法包括从用户接收访问帐户的请求,所述请求包括与用户相关联的标识符,确定先前提供给用户的秘密登录规则,以及由客户端发送要在登录映射中显示的可观察信息 与用户相关联的设备。 该示例方法还包括通过结合与用户相关联的秘密登录规则分析登录映射中所显示的可观察信息的定位来确定正确答案。 该示例方法还包括从客户端设备接收答案,并响应于匹配正确答案的答案,向用户提供用户访问。